AWS GetParameters
Retrieves one or more parameters from AWS Systems Manager Parameter Store, optionally decrypting SecureString values.
The adversary is trying to figure out your environment.
Discovery consists of techniques an adversary may use to gain knowledge about the system and internal network. These techniques help adversaries observe the environment and orient themselves before deciding how to act. They also allow adversaries to explore what they can control and what’s around their entry point in order to discover how it could benefit their current objective. Native operating system tools are often used toward this post-compromise information-gathering objective.
In cloud environments, adversaries enumerate resources, IAM policies, network configurations, and storage buckets to map out the environment. They use cloud provider APIs to list instances, describe security groups, enumerate roles and policies, and identify potential targets for lateral movement or data exfiltration.
View Discovery on MITRE ATT&CK →Retrieves one or more parameters from AWS Systems Manager Parameter Store, optionally decrypting SecureString values.
Retrieves the plaintext value of a secret stored in AWS Secrets Manager.
Lists the access keys for an Azure App Configuration store, exposing credentials used to read or write configuration data.
Reads credential assets stored in an Azure Automation account, potentially exposing sensitive authentication data.
Lists the access keys for an Azure Batch account, exposing credentials used to authenticate Batch API calls.
Lists the admin credentials for an Azure Container Registry, exposing the username and password for registry access.
Retrieves the cluster-admin kubeconfig for an AKS cluster, granting full administrative access to the cluster.
Retrieves the user-level kubeconfig for an AKS cluster.
Reads a certificate stored in an Azure Key Vault.
Reads a cryptographic key from an Azure Key Vault.
Reads a secret value from an Azure Key Vault.
Retrieves the primary and secondary access keys for a Log Analytics workspace.
Lists the access keys for an Azure Service Bus namespace authorization rule, exposing connection strings for messaging.
Lists the access keys for an Azure Storage account, exposing credentials that provide full data-plane access.
Lists the host keys for an Azure App Service or Azure Functions app, exposing function-level and master access keys.
Retrieves the plaintext value of a specific secret version from GCP Secret Manager.